EP1209897B1 - Systems and method for policy based printing and forgery detection - Google Patents
Systems and method for policy based printing and forgery detection Download PDFInfo
- Publication number
- EP1209897B1 EP1209897B1 EP20010309647 EP01309647A EP1209897B1 EP 1209897 B1 EP1209897 B1 EP 1209897B1 EP 20010309647 EP20010309647 EP 20010309647 EP 01309647 A EP01309647 A EP 01309647A EP 1209897 B1 EP1209897 B1 EP 1209897B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- document
- protection
- watermark
- copy
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32502—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices
- H04N1/32523—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices a plurality of output devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0064—Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/0077—Types of the still picture apparatus
- H04N2201/0082—Image hardcopy reproducer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/324—Selecting a particular authentication information from amongst a plurality of different authentication information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3246—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of data relating to permitted access or usage, e.g. level of access or usage parameters for digital rights management [DRM] related to still images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Definitions
- This invention relates to document forgery protection systems and methods.
- Document forgery includes both unauthorized alteration of the original document and unauthorized copying of the original document.
- watermarks have been applied to documents to detect and/or deter forgery.
- Watermarks are printed marks on a document that can be visually detected or detected using special equipment.
- Fragile watermarks are marks that appear in an original printed document but that will not appear in a copy of the original document made on a standard photocopier or will be detectably degraded in the resulting copy of the document.
- Robust watermarks are marks in an original document that will be accurately reproduced on any copy of the original document made on an standard photocopier so that information contained in the watermark can be extracted from the copy.
- the first type of robust watermark is a mark that appears on both the original document and a copy.
- the second type of robust watermark is a mark that is present, but that is not readily visible, on the original document, but that becomes clearly visible on a copy of the original document.
- the second type of robust watermark is also known as an invisible robust watermark.
- Forgery of an original document containing a fragile watermark by copying the original document is easily detected by the absence of the watermark on the copy of the original document.
- Forgery of an original document containing the first type of robust watermark is detected by extracting information contained in the robust mark.
- This information could identify a custodian of the original document and information relating to copy restrictions or other restrictions as to the use of the information in the original document. Forgery of an original document containing the second type of robust watermark is detected by the visible presence of the watermark on the copy of the original document.
- the information contained in the second type of robust watermark could be a banner that reads "This is a copy” or a similar warning.
- WO-A-99/41900 describes a system for distributing digital representations by including a watermark in the form of a secret fingerprint in the digital representation before it is encrypted and sent to a client.
- the fingerprint watermark identifies the user to whom the copy is being sent. This is a relatively simple approach but it does not take account of the variations in user capabilities in printing genuine documents provided with watermarks.
- a document forgery protection printing method comprises processing an image of a document; determining forgery protection requirements for the document to be printed; determining a protection level to be applied to the document based on the determined forgery protection requirements; and based on the determined protection level, printing at least.one watermark on the document that corresponds to the determined protection level using a printer and is characterised in that the forgery protection requirements for the document to be printed are determined from a set of different potential requirements; in that the protection level is determined from a set of different protection levels based on the determined forgery protection requirements; and in that the method further comprises selecting a printer from a plurality of printers that can print the document in accordance with the required level of protection and using the selected printer to print the at least one watermark.
- a document forgery protection printing system comprises at least one image processor that processes an image of a document including at least one page; at least one server having a print management system adapted to implement a policy that determines a forgery protection level for the document in accordance with forgery protection requirements for the document; a plurality of printers, each printer able to print the document and able to apply at least one protection level to the document by printing at least one watermark including copy evidence and tracing information on the document that corresponds to the determined protection level and is characterised in that said policy is adapted to determine the forgery protection requirements for the document from a set of different potential requirements; in that the protection level is determined from a set of different protection levels based on the determined forgery protection requirements; and in that said print management system is adapted to select a printer from the plurality of printers in accordance with the required level of protection.
- This invention provides systems and methods for adding fragile and robust watermarks to an original document as it is printed.
- This invention separately provides systems and methods for printing a document requiring forgery protection using a number of trusted printers.
- This invention separately provides a series of trusted printers that together permit differing levels of forgery protection to be provided to a document to be printed.
- a family of trusted printers is managed to provide a range of different forgery detection and deterrence techniques.
- the protection requirements for an original document to be printed are determined by a trusted printing policy.
- the factors used to determine the protection requirements required for the original document to be printed include the value of the document being created, assumptions about the resources available to an adversary or attacker, such as a potential forger, and the cost of providing the protections to the original document to be printed.
- Copy evidence is evidence that can be obtained through an inspection of a document that indicates whether that particular document is an unauthorized copy of an original document.
- Tracing information is information printed on a document that identifies the custodian(s) of the original document and restrictions on further copying that apply to the custodian(s) and to the original document. Other information may also be included in the tracing information that serves to more uniquely identify the original.
- the required copy evidence is applied to the printed document through the use of fragile watermarks or robust watermarks.
- the required tracing information is applied to the printed document through the use of robust watermarks.
- the parameters of the selected trusted printer are set by a print management system to print the watermark(s), including the copy evidence and/or tracing information, appropriate to the required level of protection.
- FIG. 1 is a schematic diagram illustrating a system for policy based printing.
- a network 100 includes at least one server 110 that controls a plurality of computers 121, 122 and 23.
- the server 110 also controls a family 130 of trusted printers 131-135.
- a trusted printer is a printer that is available only to authorized users of the network 100.
- the server 110 includes an operating system 111 that allows users of the network 100 to use various applications stored in the server 110 on the computers 121, 122 and 123.
- the applications may include, for example, word processing applications, spreadsheet applications, image scanning and/or processing applications, and/or database management applications.
- Authorized users of the computers 121, 122 and 23 can use the applications stored in the server 110 and controlled by the operating system 111 to create documents 140.
- the applications process images of the document 140 that can be viewed on the display units 151, 152 and 153 of the respective computers 121, 122 and 123.
- the document 140 can be printed by entering a print command into one of the computers 121 or 122 or 123 and sending a print job to the server 110.
- the operating system 111 includes a print management system 112 that selects one of the family 130 of the trusted printers 131-135 that can provide a required level of protection for the document 140 to be printed.
- the print management system 112 includes a policy 113 that maps the document protection requirements to the specific security protection techniques available from the family 130 of the trusted printers 131-135.
- the policy 113 determines the required protection level for the document 140 to be printed by collecting information about the value of the document 140 from the document creator or owner or from any other person authorized to print the document 140.
- the information may include assumptions about potential forgery and the cost necessary to provide a level of protection to detect and/or deter the potential forgery.
- the user may enter the information about the document 140 through a graphical user interface provided on one of the display units 151-153 of the particular computers 121-123 being used to print the document 140.
- the print management system 112 may also allow the users to question each of the trusted printers 131-135 to determine what protection level each trusted printer 131-135 provides.
- the print management system 112 may also provide information to the user about which forgery techniques each protection level is able to detect and/or deter and the costs of using each protection level.
- Each computer 121-123 may be controlled by the print management system 112 and/or the operating system 111 to display to users the protection levels that may be applied to the document 140 to be printed.
- Each document 140 to be printed may also have a security level embedded in it, attached to it or otherwise associated with it, that the print management system 112 can use to identify the specific combination of protection techniques needed to detect and/or deter potential forgery.
- the policy 113 is programmable and may be adapted to the particular requirements of the organization that operates, owns or uses the network 100. The policy 113 may be programmed to assign a protection level or levels for every authorized user of the network 100 or for every computer 121-123 of the network 100.
- Every user of the network 100 may have an identification that is programmed into the policy 113.
- the identification may be a login password or user identification.
- Every document 140 printed by the user identified by the identification may have be assigned a specified protection level, a minimum protection level and/or a maximum protection level.
- Every computer 121-123 of the network 100 may have an identification value.
- the computer identification values may be programmed into the policy 113. Every print job sent by the identified one of the computers 121-123 to the server 110 may have a specified protection level, a minimum protection level and/or a maximum protection level.
- the policy 113 determines the protection requirements for the document 140 to be printed by identifying the user that enters the print command and/or the computer 121-123 that sends the print job.
- the policy 113 may also conduct a search of the content of the document 140 to determine the required protection level.
- the search could be, for example, a keyword search or a keyphrase search of the document 40.
- the protection requirements of the document 140 could be dependent on the number of occurrences of various ones of the keywords or keyphrases.
- the policy 113 determines the security requirements for the document 140 to be printed. For example, the policy 113 may determine that the document 140 to be printed requires protection against forgery by copying using a standard photocopier. Alternatively, the policy 113 may determine that the document 40 to be printed requires protection against scanning, image processing, and alteration of the contents of the document 140. Once the policy 113 determines the security requirements, the print management system 112 identifies the specific combination of protection techniques needed to meet these requirements. The print management system 112 then routes the print job to one of the trusted printers 131-135 that can apply the appropriate protections and sets the parameters in the selected printer to apply the appropriate protection techniques to the document 140.
- Table 1 Protection Levels Technique(s) Protects Against Equipment Needed Level 0 Fragile variable copy evident watermark. Adversary with standard copier and toner or ink. Blank originals attack. Standard color printer, or special toner or ink, or hyperacuity printer with inspector. Level 1 Robust variable invisible copy evident watermark with tracing information. Adversary who can remove copy evident watermarks from originals. Blank originals attack. Compromised tracing attack. Standard color printer with special toner or ink.
- Level 2 Fragile variable fluorescing invisible copy evident watermark to print page offset, with tracing information Weak protection against tampering. Blank originals attack.
- Enhancements could include toner sensor or sensor to verify the presence of the copy-evident watermark. Fluorescent light to verify.
- Enhancements could include toner sensor or sensor to verify the presence of the copy evident watermark. Fluorescent light and fluorescent scanner to verify.
- Enhancements could include toner sensor or sensors to verify the presence of the copy evident watermark.
- Level 7 Robust variable fluorescing black copy evident watermark to print random portions of the page, with the random pattern specification encrypted and glyph encoded Adversary with standard copier and toner or ink. Adversary with a scanner and image processor. Detached toner attack. Compromised tracing attack. Fluorescing black toner or ink in a standard highlight or color printer. Fluorescent light to verify. Inspector to read and verify the glyph.
- Level 8 Robust variable fluorescing black copy evident watermark to print content dependent portions of the page, with tracing information, encrypted and glyph encoded Adversary who alters tracing information. Adversary with standard copier and ink. Adversary who can scan and image process. Detached toner or ink attack. Compromised tracing attack. Fluorescing black toner in a standard highlight or color printer. Fluorescent light to verify. Inspector to read and verify the glyph.
- Table 1 shows various watermarking techniques usable either alone or in combination to provide a specified level of protection to a document, it should be appreciated that the table is merely one exemplary embodiment of a policy 113. Other combinations of watermarking techniques may be provided to enable a greater range of protection levels.
- the protection levels, the techniques, the forgery methods that are protected against, and the equipment necessary to apply the techniques to a document to be printed and verify if a printed document is an original or a forgery are described below.
- the trusted printer 131 can print documents having Level 0 protection
- the trusted printer 132 can print documents requiring Level 1 protection
- the trusted printer 133 can print documents requiring Level 0 through Level 4 protection
- the trusted printer 134 can print documents requiring Level 4 through Level 8 protection
- the trusted printer 135 can print documents requiring Level 7 and Level 8 protection.
- Fig. 2 is a flowchart of one exemplary embodiment of a document forgery protection printing method according to this invention. Beginning in step S1000, control continues to step S1100, where a user creates a document that requires forgery protection. Then, in step S1200, the user enters a print command to print the document requiring forgery protection. Next, in Step S1300, information about the protection levels is displayed to the user. Control then continues to step S1400.
- Step S1400 information is collected about the value of the document requiring forgery protection.
- the information may include information or assumptions about potential forgery of the document requiring forgery protection and the cost of applying the various available protection techniques to the document requiring forgery protection.
- step S1500 the protection requirements of the document requiring forgery protection are determined based on a trusted printing policy.
- the determined protection requirements for the document requiring forgery protection may indicate that this document requires protection against forgery from copying using a standard photocopier or that the document requiring forgery protection requires protection against forgery by scanning, image processing and altering of the contents of the document.
- step S1600 the protection level that provides the specific combination of protection techniques to meet the determined protection requirements is determined. Control then continues to step S1700.
- step S1700 a trusted printer that can apply the appropriate protection techniques to the document requiring forgery protection is selected based on the determined protection level. Then, in step S1800, the print job for the document requiring forgery protection is routed to the selected trusted printer. Next, in step S1900, the parameters in the selected trusted printer are set based on the determined protection level. In step S2000, the document requiring forgery protection, including the protection techniques of the determined protection level, is printed using the selected trusted printer. Then in step S2100 the method ends.
- the information about the protection levels may be displayed prior to the print command being entered.
- the information about the value of the document and the potential forgery of the document may also be collected prior to the print command being entered .
- the parameters of the selected trusted printer may be set prior to the print job being routed to the selected trusted printer.
- the trusted printers 131 and 133 can print documents having Level 0 protection.
- Level 0 protection includes a fragile variable copy evident watermark.
- the content owner who may be anyone authorized to create the document 140, view the document 140, and/or print the document 140, provides image data from an image data source, which may be one of the computers 121-123 or an external data storage device, to an image processor, which may be an application stored on the server 110, to create the document 140.
- Copy evidence is also provided to the image processor and included with the contents of the document 140.
- the copy evidence included in the document 140 can vary with the page of the document 140 and could include information identifying the contents of the page, the page number or identifier, the author, the document title, the date, the time, and the originating organization.
- the copy evidence could also include characteristics about the trusted printer 131 or 133 or a unique copy number recorded by the trusted printer 131 or 131.
- the copy evidence may be provided by the content owner through a graphical user interface provided on one of the display units 151-153 of one of the respective computers 121-123, or may be determined automatically by the operating system 111, the print management system 112, and/or the policy 113.
- the copy evidence is encoded in a fragile variable copy evident watermark. Because the copy evidence varies with each page of the document, the fragile variable copy evident watermark varies with each page.
- the fragile variable copy evident watermark of Level 0 may be formed by any known technique for forming fragile watermarks.
- Techniques for forming fragile watermarks include, for example, microvariations in ink density within the letters, extremely small glyphs contained in the letters, very small marks or textures, possibly in color, that are printed on the background or one or more unused portions of the sheet of recording material that the document is printed on that are made to appear as shading or fibers in the sheet of recording material, hyperacuity pixels within characters of text, and serpentones within color or black and white images.
- the print management system 112 routes the print job to either trusted printer131 or 133.
- the print management system 112 also sets the parameters in the trusted printer 131 or 133 to print the fragile variable copy evident watermark.
- the fragile variable copy evident watermark may be made more difficult to forge by encoding the copy evidence in the fragile variable copy evident watermark so that the information can only be decoded by a secret key contained in the trusted printer 131 or 133 or belonging to the content owner.
- the copy evidence contained in the fragile variable copy evident watermark may also depend on unique physical characteristics of the trusted printer 131 or 133.For example, a random pattern may be applied to the document by the trusted printer 31 or 33 as disclosed in U.S. Application Serial No. 09/504,036 .
- Copy evidence unknown to an adversary, such as a forger could also be encoded in the fragile variable copy evident watermark or the fragile variable copy evident watermark could be printed using methods that are difficult or very expensive to reproduce such as, for example, spectral modulation.
- the trusted printer 131 or 133 may be a standard color printer or a standard printer provided with special toner or ink, such as, for example, fluorescing or magnetic toner or ink.
- the trusted printer 131 or 133 may also be a hyperacuity printer that can print serpentones.
- An inspector device may be used to verify the presence of the serpentones, or the presence of the special toner or ink. The inspector device can also read the contents of the fragile variable copy watermark.
- Such printers and inspector devices are disclosed in US-A-5,706,099 and US-A-5,710,636 .
- the trusted printer 131 or 133 prints the document 140 on standard paper.
- Standard paper is paper that does not necessarily have a preprinted watermark.
- a document 140 printed with the fragile variable copy evident watermark of Level 0 is protected against an adversary having access to the original printed document and a standard photocopier with standard toner or ink.
- a visual inspector can verify if a document is an original or a forgery. The visual inspector may be any person authorized to inspect documents for authenticity.
- a document is verified as an original by the undistorted appearance of the fragile variable copy evident mark.
- a document is established as a forgery by the absence, or the discolored appearance, of the fragile variable copy evident mark.
- the inspector device may be required to verify the presence of, and read the contents of, the copy evident watermark.
- Level 0 also protects against a blank originals attack.
- a blank originals attack is attempted forgery by copying of the original document on blank originals.
- Blank originals are sheets of recording material containing a preprinted fragile watermark
- the preprinted fragile watermark of the blank originals does not vary with the page printed.
- the presence of the non-varying preprinted fragile watermark can be detected by the visual inspector. Detecting of a non-varying fragile watermark establishes a document as a forgery.
- trusted printers 132 or 133 can print documents having Level 1 protection.
- Level 1 protection includes a robust invisible variable copy evident watermark with tracing information.
- the robust invisible variable copy evident watermark may be formed by any known or later developed technique for forming robust watermarks. Techniques for forming robust watermarks include, for example, slight vertical translations of letters with respect to a baseline, slight variations of spacing between letters, line indents, margins, and/or line spacings.
- the robust watermarks may also be formed by adding luminance or gray-scale noise-like patterns.
- the robust invisible variable copy evident watermark of Level 1 can be used to encode the copy evidence and the tracing information.
- the copy evidence included in the document 140 can vary with the page of the document 140 and could include information identifying the content of the page, the page number or identifier, the author, the document title, the date, the time, and the originating organization.
- the copy evidence could also include characteristics about the trusted printer 132 or 133 or a unique copy number recorded by the trusted printer 132 or 133.
- the copy evidence can also include a large banner that prominently displays a warning statement, such as, for example, "This is a copy" or some similar warning.
- the tracing information may include, for example, information identifying to whom the original document was given, who is authorized to possess the document, and information relating to copy restrictions or other restrictions as to the use of the information in the document.
- the tracing information can be specified in Digital Property Rights Language.
- the copy evidence and tracing information are encoded in the robust invisible variable copy evident watermark.
- the content owner provides image data from an image data source, which may be one of the computers 121-123 or an external data storage device, to an image processor, which may be an application stored on the server 110, to create the document 140.
- Copy evidence and tracing information is also provided to the image processor and included with the contents of the document 140.
- the copy evidence and the tracing information are included in the contents of the document 140.
- the copy evidence and the tracing information included in the document 140 may be entered by the content owner through a graphical user interface provided on one of the display units 151-153 of one of the respective computers 121-123, or may be determined automatically by the operating system 111, the print management system 112, and/or the policy 113.
- the print management system 112 routes the print job to the trusted printer 132 or 133 and the document is printed on standard paper.
- Level 1 provides protection against an adversary who has access to the original document 140 and a standard photocopier and standard paper and toner or ink. If the adversary copies the original document 140 on the standard photocopier using standard toner or ink and standard paper, a visual inspector can establish the resulting copy as a forgery by noting the clearly visible appearance of the robust variable copy evident watermark on the resulting copy. If a document appears to lack the robust variable copy evident watermark, this is evidence that the document may be an original, but a second tier inspection is required.
- the second tier inspection can determine if a document is an original.
- the document is copied on a standard copier using standard paper. If the resulting copy contains a clearly visible watermark, the original document can be verified as an original.
- Level 1 provides protection against an adversary that can remove the robust variable copy evident watermark by, for example, scanning the document and removing or deleting the watermark during image processing. As shown in Table 1 and Fig. 4 , Level 1 also provides protection against blank originals attacks. Level 1 also protects against a compromised tracing attack, where the adversary intercepts or tampers with the source of the tracing information.
- the trusted printer 132 or 133 may be an standard color printer provided that may use special toner or ink including, for example, fluorescing toner or ink.
- the trusted printer 133 can print documents having Level 2 protection.
- Level 2 protection includes a fragile variable fluorescing invisible copy evident watermark with tracing information.
- the copy evidence may include the text of the page offset by some distance, but in any event depends on the contents of the page.
- the copy evidence and the tracing information may be encoded in the fragile variable fluorescing invisible copy evident watermark.
- the document, including the contents, the copy evidence and tracing information is printed by the trusted printer 133 on standard paper using a special toner or ink.
- the special toner or ink is invisible fluorescing toner or ink.
- the trusted printer 133 can be a standard highlight or color printer that is supplied with the fluorescing invisible toner or ink. A sensor on the output of the printer could verify that the copy-evident mark is properly printed.
- variable nature of the copy-evident mark prevents a blank originals attack where the adversary pre-processes the paper by putting the special marks on it.
- the identifying information also allows for tracing the source of the unauthorized copy action. That is, the underlying information identifies who had custody over the original and should have been protecting it.
- the Level 2 protection might also be used to give some protection against an adversary who tries to tamper with the contents of the document, because the two printings on the page would be visually different under fluorescent light.
- Level 2 provides protection against an adversary who has access to the original document and a standard photocopier with standard toner or ink.
- a document can be verified as an original by illuminating that document with fluorescence-exciting light. If the document contains a watermark that fluoresces under the fluorescence-exciting light and that matches the visible contents of the page, the document can be verified as an original. If the document does not have a watermark, if the document contains a watermark that does not fluoresce under fluorescence-exciting light, or if the document contains a watermark that fluoresces but does not match the visible contents of the page, the document can be established as a copy.
- Level 3 protection includes a fragile variable fluorescing invisible copy evident watermark with tracing information.
- the mark includes a copy or a portion of the text of the page offset to the right by some distance and printed using invisible fluorescing toner. Tracing information such as printer, user, timestamp, document-id, and page number is also printed using the invisible ink.
- the information contained in the copy evident mark is digitally signed and encoded into a glyph code that is printed in the left margin of the page.
- Level 3 provides protection against an adversary who can scan, image process, and print, and thus attempt to tamper with the content of the document, and who has access to the special ink used. Protection against a naive attacker is via a fluorescent detector as in Level 2 protection. Additional tamper protection and authenticity is provided by the digital signature encoded in the glyph code.
- Special inks and an ordinary highlight printer or an ordinary color printer can be used to print the original documents.
- Enhancements to the printer can include sensors to check that fluorescent toner is loaded and used. Additionally, a sensor on the output of the printer can be used to verify that the copy evident mark is properly printed.
- a fluorescence-exciting light source can be used to expose the copy evident mark and a fluorescent light scanner can be used to read the information printed in fluorescent ink. This method is backward compatible with Level 2 protection.
- a document may be verified as an original by the presence of a fluorescent copy-evident mark that matches the visible contents of the page or by successful verification of the digital signature encoded in the glyph code.
- a document may be verified as a copy by the absence of the fluorescent copy evident mark. If the fluorescent copy evident mark exists, the document may still be verified as a copy if the digital signature cannot be successfully verified.
- Level 4 protection includes a fragile invisible fluorescing variable copy evident watermark to print randomly generated patterns. Tracing information is also included in the copy evident watermark. The random pattern of the copy evident mark is digitally signed and encoded into a glyph code that is printed on the page.
- Level 4 provides protection against an adversary who has access to a scanner, image processing software, and a color printer, as well as access to the special ink used, and who may attempt to use these to tamper with the content of the document or to forge an acceptable copy evident mark. Additional tamper protection and authenticity is provided by the digital signature encoded in the glyph code.
- Special inks and an ordinary highlight printer or ordinary color printer can be used to print the original documents. Enhancements to the printer could include sensors to check that fluorescent toner is loaded and used. Additionally, a sensor on the output of the printer can be used to verify that the pattern is properly printed.
- a fluorescent light source can be used to expose the copy evident mark.
- a fluorescence-exciting light scanner can be used to read the information printed in the fluorescent ink.
- a document may be verified as an original if the fluorescent pattern measured from the paper matches the pattern encoded in the glyph code or by successful verification of the digital signature.
- a document may be verified as a copy by the absence of the fluorescent copy evident watermark. If the copy evident mark is present, the document may still be verified as a copy if the fluorescent pattern measured from the paper fails to match the pattern encoded in the glyph code.
- a document may also be verified as a copy if the digital signature cannot be successfully verified.
- the trusted printer 134 can print documents having Level 5 protection.
- Level 5 As shown in Table 1, copy evidence is provided by the use of a robust fluorescing black copy evident mark. Tracing information is encoded in the mark.
- Level 5 provides protection against an adversary who uses a standard copier to make an unauthorized copy or attempted forgery, and who does not have access to the fluorescing ink.
- the equipment that can be used to enable Level 5 protection is fluorescing black toner in an ordinary highlight or color printer.
- a fluorescence-exciting light source can aid in the verification of the copy evident watermark.
- a document may be verified as an original by visually inspecting the document. Visual inspection reveals the fluorescing black copy evident mark.
- a document may be verified as a copy by the absence of the copy evident mark, or a copy evident mark printed in ordinary ink.
- the trusted printer 134 can print documents having Level 6 protection.
- copy evidence is provided by the use of a robust fluorescing black copy evident mark.
- such as mark could be created by printing fluorescing invisible ink over ordinary black ink.
- the fluorescent black ink is used to print fixed portions of the document contents (the portion selected to be printed in this way does not depend on the document contents). Tracing information can also be encoded in the mark.
- Level 6 provides protection against an adversary who uses a plain copier to make an unauthorized copy or attempted forgery and who does not have access to the special ink. Level 6 also protects against an adversary with physical access to the trusted printer that detaches the fluorescing toner, since this would cause portions of the printed page to disappear.
- the equipment that can be used to provide Level 6 protection includes fluorescing black toner or ink in an ordinary highlight or color printer or a combination of fluorescing invisible ink and ordinary black ink.
- a special viewer can be used to detect and verify the correct pattern of the copy evident watermark.
- a document may be verified as an original by visually inspecting the document to verify that the entire contents of the document page have been printed.
- a special viewer may be used to verify that part of the visible contents of the document fluoresces or to verify the correct fluorescent pattern.
- a document may be verified as a copy by visually inspecting the document. If a portion of the page has not been printed, the document can be verified as a copy. If the entire page has been printed, the document may be verified as a copy by the absence of the fluorescing black copy evident mark, or by the existence of a non-fluorescing copy evident mark. A document may be verified as a copy if the special viewer reveals an incorrect fluorescing pattern in the copy evident mark.
- the trusted printers 134 and 135 can print documents having Level 7 protection.
- Level 7 protection includes a robust fluorescent black variable copy evident watermark.
- the fluorescent black toner or ink is used to print randomly selected portions of the content of the document.
- the information about which pattern is used is encrypted and encoded as a glyph code that is printed on the document using a key that is known to the trusted printers 134 and 135 and to an inspector device.
- the inspector device can read the glyph code, decode the glyph code to get the encrypted pattern information, and decrypt the pattern information.
- the copy evidence and the tracing information are also encoded in the watermark.
- Level 7 provides protection against an adversary that has access to an original document and the trusted printer 134 or 135 but does not have access to the fluorescent black toner or ink. Level 7 also protects against an attacker with physical access to the trusted printer that detaches the fluorescing toner, since this would cause portions of the printed page to disappear. Level 7 also protects against an attacker who has a scanner and an image processor.
- Verification of a document as an original can be done using fluorescence-exciting light. If portions of the document fluoresces when exposed to fluorescence-exciting light, this is evidence that the document may be an original. A second tier inspection is necessary. The inspector device verifies that the decrypted glyph-encoded information matches the fluorescent pattern. If portions of the document are missing, the document can be verified as a copy. If the entire document is printed but has no watermark or a black watermark that does not fluoresce, the document can be established as a copy. If the document has fluorescent portions but the decrypted glyph encoded information does not match the fluorescent pattern, the document can be established as a copy. If the decoded, decrypted pattern information matches the detected pattern, the document can be verified as an original.
- the trusted printers 134 and 135 can be standard highlight or color printers provided with fluorescent black toner.
- Level 8 protection includes a robust fluorescing black variable copy evident watermark to print content dependent portions of the document, with tracing information that is encrypted given a key known to the printer and to the inspector device and glyph encoded.
- the watermark includes selected portions of the document's contents that are printed in fluorescing black toner or ink. The selected portions are selected as a function of the document's content.
- Information about the user and about the trusted printer 134 or 135 and the fluorescing pattern are encrypted and encoded in a glyph code that is printed on the document.
- Level 8 provides protection against an adversary that has access to the original document and a standard copier and standard toner or ink. As shown in Fig. 11 , Level 8 also protects against an adversary that has access to the original document, a scanner, an image processor and the trusted printer 134 or 135 and who tries to alter the tracing information. Even if the attacker tries to alter the tracing information, the attacker doesn't know the key to encrypt or decrypt the tracing information. Level 8 also protects against a detached toner attack, since this would cause portions of the printed page to disappear.
- Establishing a document as a copy can also be done by a visual inspection. If portions of the printed document are missing, the document can be established as a copy. If the entire document is printed but has no visible watermark or a visible watermark that does not fluoresce; the document can be established as a copy.
- a second tier inspection determines if the pattern information that is decoded and decrypted from the glyph code by the inspector device matches the fluorescent pattern detected by a fluorescent light scanner. If the decoded, decrypted pattern information matches the detected pattern, the document can be verified as an original.
- the trusted printers 134 and 135 can be standard highlight or color printers provided with fluorescent black toner.
- a fluorescent light scanner can be used to detect the fluorescent pattern and an inspector device can be used to read the glyph, decode the glyph to get the encrypted pattern information, decrypt the pattern information and match the pattern information against the detected fluorescent pattern.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Image Processing (AREA)
- Record Information Processing For Printing (AREA)
- Facsimile Image Signal Circuits (AREA)
Description
- This invention relates to document forgery protection systems and methods.
- Various techniques are known for detecting and/or deterring forgery of an original printed document. Document forgery includes both unauthorized alteration of the original document and unauthorized copying of the original document. Previously, watermarks have been applied to documents to detect and/or deter forgery. Watermarks are printed marks on a document that can be visually detected or detected using special equipment. Fragile watermarks are marks that appear in an original printed document but that will not appear in a copy of the original document made on a standard photocopier or will be detectably degraded in the resulting copy of the document.
- Robust watermarks are marks in an original document that will be accurately reproduced on any copy of the original document made on an standard photocopier so that information contained in the watermark can be extracted from the copy. There are two types of robust watermarks that can be used. The first type of robust watermark is a mark that appears on both the original document and a copy. The second type of robust watermark is a mark that is present, but that is not readily visible, on the original document, but that becomes clearly visible on a copy of the original document. The second type of robust watermark is also known as an invisible robust watermark.
- Forgery of an original document containing a fragile watermark by copying the original document is easily detected by the absence of the watermark on the copy of the original document. Forgery of an original document containing the first type of robust watermark is detected by extracting information contained in the robust mark.
- This information could identify a custodian of the original document and information relating to copy restrictions or other restrictions as to the use of the information in the original document. Forgery of an original document containing the second type of robust watermark is detected by the visible presence of the watermark on the copy of the original document. For example, the information contained in the second type of robust watermark could be a banner that reads "This is a copy" or a similar warning.
-
WO-A-99/41900 - In accordance with a first aspect of the present invention, a document forgery protection printing method comprises processing an image of a document;
determining forgery protection requirements for the document to be printed;
determining a protection level to be applied to the document based on the determined forgery protection requirements; and
based on the determined protection level, printing at least.one watermark on the document that corresponds to the determined protection level using a printer and is characterised in that the forgery protection requirements for the document to be printed are determined from a set of different potential requirements;
in that the protection level is determined from a set of different protection levels based on the determined forgery protection requirements; and
in that the method further comprises selecting a printer from a plurality of printers that can print the document in accordance with the required level of protection and using the selected printer to print the at least one watermark. - In accordance with a second aspect of the present invention, a document forgery protection printing system comprises at least one image processor that processes an image of a document including at least one page;
at least one server having a print management system adapted to implement a policy that determines a forgery protection level for the document in accordance with forgery protection requirements for the document;
a plurality of printers, each printer able to print the document and able to apply at least one protection level to the document by printing at least one watermark including copy evidence and tracing information on the document that corresponds to the determined protection level and is characterised in that said policy is adapted to determine the forgery protection requirements for the document from a set of different potential requirements;
in that the protection level is determined from a set of different protection levels based on the determined forgery protection requirements; and
in that said print management system is adapted to select a printer from the plurality of printers in accordance with the required level of protection. - This invention provides systems and methods for adding fragile and robust watermarks to an original document as it is printed.
- This invention separately provides systems and methods for printing a document requiring forgery protection using a number of trusted printers.
- This invention separately provides a series of trusted printers that together permit differing levels of forgery protection to be provided to a document to be printed.
- In accordance with various exemplary embodiments of the systems and methods according to this invention, a family of trusted printers is managed to provide a range of different forgery detection and deterrence techniques. The protection requirements for an original document to be printed are determined by a trusted printing policy. The factors used to determine the protection requirements required for the original document to be printed include the value of the document being created, assumptions about the resources available to an adversary or attacker, such as a potential forger, and the cost of providing the protections to the original document to be printed.
- When an original document requiring forgery protection is to be printed, the print job for that document is routed to a trusted printer that can print a watermark that includes copy evidence and/or tracing information necessary to obtain the required level of protection. Copy evidence is evidence that can be obtained through an inspection of a document that indicates whether that particular document is an unauthorized copy of an original document. Tracing information is information printed on a document that identifies the custodian(s) of the original document and restrictions on further copying that apply to the custodian(s) and to the original document. Other information may also be included in the tracing information that serves to more uniquely identify the original. The required copy evidence is applied to the printed document through the use of fragile watermarks or robust watermarks. The required tracing information is applied to the printed document through the use of robust watermarks. The parameters of the selected trusted printer are set by a print management system to print the watermark(s), including the copy evidence and/or tracing information, appropriate to the required level of protection.
- These and other features of the invention will be described in or are apparent from the following detailed description of various exemplary embodiments of systems and methods according to this invention.
- Particular embodiments in accordance with this invention will now be described with reference to the accompanying drawings; in which:-
-
Fig. 1 is a schematic diagram illustrating a print management system according to this invention; -
Fig. 2 is a flowchart of a document forgery protection printing method according to an exemplary embodiment of this invention; -
Fig. 3 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 4 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 5 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 6 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 7 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 8 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; -
Fig. 10 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention; and -
Fig. 11 is a flow diagram of a document forgery protection printing and detection system according to an exemplary embodiment of this invention. -
Fig. 1 is a schematic diagram illustrating a system for policy based printing. Anetwork 100 includes at least oneserver 110 that controls a plurality ofcomputers server 110 also controls afamily 130 of trusted printers 131-135. A trusted printer is a printer that is available only to authorized users of thenetwork 100. Theserver 110 includes anoperating system 111 that allows users of thenetwork 100 to use various applications stored in theserver 110 on thecomputers computers server 110 and controlled by theoperating system 111 to createdocuments 140. The applications process images of thedocument 140 that can be viewed on thedisplay units respective computers - The
document 140 can be printed by entering a print command into one of thecomputers server 110. Theoperating system 111 includes aprint management system 112 that selects one of thefamily 130 of the trusted printers 131-135 that can provide a required level of protection for thedocument 140 to be printed. Theprint management system 112 includes apolicy 113 that maps the document protection requirements to the specific security protection techniques available from thefamily 130 of the trusted printers 131-135. - The
policy 113 determines the required protection level for thedocument 140 to be printed by collecting information about the value of thedocument 140 from the document creator or owner or from any other person authorized to print thedocument 140. The information may include assumptions about potential forgery and the cost necessary to provide a level of protection to detect and/or deter the potential forgery. The user may enter the information about thedocument 140 through a graphical user interface provided on one of the display units 151-153 of the particular computers 121-123 being used to print thedocument 140. - The
print management system 112 may also allow the users to question each of the trusted printers 131-135 to determine what protection level each trusted printer 131-135 provides. Theprint management system 112 may also provide information to the user about which forgery techniques each protection level is able to detect and/or deter and the costs of using each protection level. Each computer 121-123 may be controlled by theprint management system 112 and/or theoperating system 111 to display to users the protection levels that may be applied to thedocument 140 to be printed. - Each
document 140 to be printed may also have a security level embedded in it, attached to it or otherwise associated with it, that theprint management system 112 can use to identify the specific combination of protection techniques needed to detect and/or deter potential forgery. Thepolicy 113 is programmable and may be adapted to the particular requirements of the organization that operates, owns or uses thenetwork 100. Thepolicy 113 may be programmed to assign a protection level or levels for every authorized user of thenetwork 100 or for every computer 121-123 of thenetwork 100. - Every user of the
network 100 may have an identification that is programmed into thepolicy 113. The identification may be a login password or user identification. Everydocument 140 printed by the user identified by the identification may have be assigned a specified protection level, a minimum protection level and/or a maximum protection level. - Every computer 121-123 of the
network 100 may have an identification value. The computer identification values may be programmed into thepolicy 113. Every print job sent by the identified one of the computers 121-123 to theserver 110 may have a specified protection level, a minimum protection level and/or a maximum protection level. Thepolicy 113 determines the protection requirements for thedocument 140 to be printed by identifying the user that enters the print command and/or the computer 121-123 that sends the print job. - The
policy 113 may also conduct a search of the content of thedocument 140 to determine the required protection level. The search could be, for example, a keyword search or a keyphrase search of the document 40. The protection requirements of thedocument 140 could be dependent on the number of occurrences of various ones of the keywords or keyphrases. - The
policy 113 determines the security requirements for thedocument 140 to be printed. For example, thepolicy 113 may determine that thedocument 140 to be printed requires protection against forgery by copying using a standard photocopier. Alternatively, thepolicy 113 may determine that the document 40 to be printed requires protection against scanning, image processing, and alteration of the contents of thedocument 140. Once thepolicy 113 determines the security requirements, theprint management system 112 identifies the specific combination of protection techniques needed to meet these requirements. Theprint management system 112 then routes the print job to one of the trusted printers 131-135 that can apply the appropriate protections and sets the parameters in the selected printer to apply the appropriate protection techniques to thedocument 140. Examples of the protection levels that can be applied to thedocument 140 when it is printed, the forgery techniques that the protection levels protect against and the equipment necessary for creating the protection level and verifying the authenticity of a document are described in Table 1.Table 1 Protection Levels Technique(s) Protects Against Equipment Needed Level 0Fragile variable copy evident watermark. Adversary with standard copier and toner or ink. Blank originals attack. Standard color printer, or special toner or ink, or hyperacuity printer with inspector. Level 1Robust variable invisible copy evident watermark with tracing information. Adversary who can remove copy evident watermarks from originals.
Blank originals attack. Compromised tracing attack.Standard color printer with special toner or ink. Level 2Fragile variable fluorescing invisible copy evident watermark to print page offset, with tracing information. Weak protection against tampering.
Blank originals attack.Special toner or ink and standard highlight or color printer. Enhancements could include toner sensor or sensor to verify the presence of the copy-evident watermark. Fluorescent light to verify. Level 3Fragile variable fluorescing invisible copy evident watermark to print page offset, with tracing information, digitally signed and glyph encoded. Adversary who can scan, image process, and print and who has access to the special toner or ink. Special toner or ink and standard highlight or color printer. Enhancements could include toner sensor or sensor to verify the presence of the copy evident watermark. Fluorescent light and fluorescent scanner to verify. Level 4Fragile variable fluorescing invisible copy evident watermark to print random portions of the page, with tracing information, digitally signed and glyph encoded. Adversary who can scan, image process, and print and who has the special toner or ink. Special toner or ink and standard highlight or color printer. Enhancements could include toner sensor or sensors to verify the presence of the copy evident watermark. Fluorescent light and fluorescent scanner to verify. Level 5Robust variable fluorescing black copy evident watermark with tracing information. Adversary with standard copier and toner or ink.
Compromised tracing attack.Fluorescing black toner or ink in a standard highlight or color printer. Fluorescent light to verify. Level 6Robust variable fluorescing black copy evident watermark with tracing information to print fixed portions of the page. Adversary with standard copier and tone or ink. Detached toner attack. Blank originals attack. Fluorescing black toner or ink in a standard highlight or color printer. Fluorescent light to verify. Level 7Robust variable fluorescing black copy evident watermark to print random portions of the page, with the random pattern specification encrypted and glyph encoded Adversary with standard copier and toner or ink. Adversary with a scanner and image processor.
Detached toner attack.
Compromised tracing attack.Fluorescing black toner or ink in a standard highlight or color printer. Fluorescent light to verify. Inspector to read and verify the glyph. Level 8Robust variable fluorescing black copy evident watermark to print content dependent portions of the page, with tracing information, encrypted and glyph encoded Adversary who alters tracing information. Adversary with standard copier and ink. Adversary who can scan and image process. Detached toner or ink attack. Compromised tracing attack. Fluorescing black toner in a standard highlight or color printer. Fluorescent light to verify. Inspector to read and verify the glyph. - Although Table 1 shows various watermarking techniques usable either alone or in combination to provide a specified level of protection to a document, it should be appreciated that the table is merely one exemplary embodiment of a
policy 113. Other combinations of watermarking techniques may be provided to enable a greater range of protection levels. The protection levels, the techniques, the forgery methods that are protected against, and the equipment necessary to apply the techniques to a document to be printed and verify if a printed document is an original or a forgery are described below. - As shown in
Fig. 1 , the trustedprinter 131 can printdocuments having Level 0 protection, the trustedprinter 132 can printdocuments requiring Level 1 protection, the trustedprinter 133 can printdocuments requiring Level 0 throughLevel 4 protection, the trustedprinter 134 can printdocuments requiring Level 4 throughLevel 8 protection and the trustedprinter 135 can printdocuments requiring Level 7 andLevel 8 protection. -
Fig. 2 is a flowchart of one exemplary embodiment of a document forgery protection printing method according to this invention. Beginning in step S1000, control continues to step S1100, where a user creates a document that requires forgery protection. Then, in step S1200, the user enters a print command to print the document requiring forgery protection. Next, in Step S1300, information about the protection levels is displayed to the user. Control then continues to step S1400. - In Step S1400, information is collected about the value of the document requiring forgery protection. The information may include information or assumptions about potential forgery of the document requiring forgery protection and the cost of applying the various available protection techniques to the document requiring forgery protection. Next, in step S1500, the protection requirements of the document requiring forgery protection are determined based on a trusted printing policy. The determined protection requirements for the document requiring forgery protection may indicate that this document requires protection against forgery from copying using a standard photocopier or that the document requiring forgery protection requires protection against forgery by scanning, image processing and altering of the contents of the document. Then, in step S1600, the protection level that provides the specific combination of protection techniques to meet the determined protection requirements is determined. Control then continues to step S1700.
- In step S1700, a trusted printer that can apply the appropriate protection techniques to the document requiring forgery protection is selected based on the determined protection level. Then, in step S1800, the print job for the document requiring forgery protection is routed to the selected trusted printer. Next, in step S1900, the parameters in the selected trusted printer are set based on the determined protection level. In step S2000, the document requiring forgery protection, including the protection techniques of the determined protection level, is printed using the selected trusted printer. Then in step S2100 the method ends.
- Although one exemplary embodiment of a document forgery protection printing method according to this invention has been described above with respect to
Fig. 2 , it should be appreciated that other exemplary embodiments of document forgery protection printing methods may be apparent to those of ordinary skill in the art. For example, in various exemplary embodiments of the document forgery protection printing method according to this invention, the information about the protection levels may be displayed prior to the print command being entered. In other various exemplary embodiments of the document forgery protection printing method invention of this invention, the information about the value of the document and the potential forgery of the document may also be collected prior to the print command being entered . In other various exemplary embodiments of the document forgery protection printing method according of this invention, the parameters of the selected trusted printer may be set prior to the print job being routed to the selected trusted printer. - As shown in
Fig. 1 , the trustedprinters documents having Level 0 protection. As shown in Table 1,Level 0 protection includes a fragile variable copy evident watermark. As shown inFig. 3 , the content owner, who may be anyone authorized to create thedocument 140, view thedocument 140, and/or print thedocument 140, provides image data from an image data source, which may be one of the computers 121-123 or an external data storage device, to an image processor, which may be an application stored on theserver 110, to create thedocument 140. Copy evidence is also provided to the image processor and included with the contents of thedocument 140. The copy evidence included in thedocument 140 can vary with the page of thedocument 140 and could include information identifying the contents of the page, the page number or identifier, the author, the document title, the date, the time, and the originating organization. The copy evidence could also include characteristics about the trustedprinter printer operating system 111, theprint management system 112, and/or thepolicy 113. The copy evidence is encoded in a fragile variable copy evident watermark. Because the copy evidence varies with each page of the document, the fragile variable copy evident watermark varies with each page. - The fragile variable copy evident watermark of
Level 0 may be formed by any known technique for forming fragile watermarks. Techniques for forming fragile watermarks include, for example, microvariations in ink density within the letters, extremely small glyphs contained in the letters, very small marks or textures, possibly in color, that are printed on the background or one or more unused portions of the sheet of recording material that the document is printed on that are made to appear as shading or fibers in the sheet of recording material, hyperacuity pixels within characters of text, and serpentones within color or black and white images. - If the
policy 113 determines that the security requirements for thedocument 140 to be printed require a fragile variable copy evident watermark, theprint management system 112 routes the print job to either trusted printer131 or 133. Theprint management system 112 also sets the parameters in the trustedprinter - The fragile variable copy evident watermark may be made more difficult to forge by encoding the copy evidence in the fragile variable copy evident watermark so that the information can only be decoded by a secret key contained in the trusted
printer printer 131 or 133.For example, a random pattern may be applied to the document by the trusted printer 31 or 33 as disclosed in U.S. Application Serial No.09/504,036 - As shown in Table 1, the trusted
printer printer US-A-5,706,099 andUS-A-5,710,636 . - As shown in
Fig. 3 , the trustedprinter document 140 on standard paper. Standard paper is paper that does not necessarily have a preprinted watermark. As shown inFig. 3 , adocument 140 printed with the fragile variable copy evident watermark ofLevel 0 is protected against an adversary having access to the original printed document and a standard photocopier with standard toner or ink. A visual inspector can verify if a document is an original or a forgery. The visual inspector may be any person authorized to inspect documents for authenticity. A document is verified as an original by the undistorted appearance of the fragile variable copy evident mark. A document is established as a forgery by the absence, or the discolored appearance, of the fragile variable copy evident mark. Depending on the technology used to generate the copy evident watermark, the inspector device may be required to verify the presence of, and read the contents of, the copy evident watermark. - As shown in
Fig. 3 , because the copy evidence in the fragile copy evident watermark ofLevel 0 varies with the page printed,Level 0 also protects against a blank originals attack. A blank originals attack is attempted forgery by copying of the original document on blank originals. Blank originals are sheets of recording material containing a preprinted fragile watermark However, the preprinted fragile watermark of the blank originals does not vary with the page printed. Thus, the presence of the non-varying preprinted fragile watermark can be detected by the visual inspector. Detecting of a non-varying fragile watermark establishes a document as a forgery. - As shown in
Fig. 1 , trustedprinters documents having Level 1 protection. As shown in Table 1,Level 1 protection includes a robust invisible variable copy evident watermark with tracing information. The robust invisible variable copy evident watermark may be formed by any known or later developed technique for forming robust watermarks. Techniques for forming robust watermarks include, for example, slight vertical translations of letters with respect to a baseline, slight variations of spacing between letters, line indents, margins, and/or line spacings. The robust watermarks may also be formed by adding luminance or gray-scale noise-like patterns. - The robust invisible variable copy evident watermark of
Level 1 can be used to encode the copy evidence and the tracing information. The copy evidence included in thedocument 140 can vary with the page of thedocument 140 and could include information identifying the content of the page, the page number or identifier, the author, the document title, the date, the time, and the originating organization. The copy evidence could also include characteristics about the trustedprinter printer - As shown in
Fig. 4 , the content owner provides image data from an image data source, which may be one of the computers 121-123 or an external data storage device, to an image processor, which may be an application stored on theserver 110, to create thedocument 140. Copy evidence and tracing information is also provided to the image processor and included with the contents of thedocument 140. During image processing of thedocument 140, the copy evidence and the tracing information are included in the contents of thedocument 140. The copy evidence and the tracing information included in thedocument 140 may be entered by the content owner through a graphical user interface provided on one of the display units 151-153 of one of the respective computers 121-123, or may be determined automatically by theoperating system 111, theprint management system 112, and/or thepolicy 113. - The
print management system 112 routes the print job to the trustedprinter Fig. 4 ,Level 1 provides protection against an adversary who has access to theoriginal document 140 and a standard photocopier and standard paper and toner or ink. If the adversary copies theoriginal document 140 on the standard photocopier using standard toner or ink and standard paper, a visual inspector can establish the resulting copy as a forgery by noting the clearly visible appearance of the robust variable copy evident watermark on the resulting copy. If a document appears to lack the robust variable copy evident watermark, this is evidence that the document may be an original, but a second tier inspection is required. - As shown in
Fig. 4 , the second tier inspection can determine if a document is an original. The document is copied on a standard copier using standard paper. If the resulting copy contains a clearly visible watermark, the original document can be verified as an original. - As shown in Table 1,
Level 1 provides protection against an adversary that can remove the robust variable copy evident watermark by, for example, scanning the document and removing or deleting the watermark during image processing. As shown in Table 1 andFig. 4 ,Level 1 also provides protection against blank originals attacks.Level 1 also protects against a compromised tracing attack, where the adversary intercepts or tampers with the source of the tracing information. The trustedprinter - As shown in
Fig. 1 , the trustedprinter 133 can printdocuments having Level 2 protection. As shown in Table 1,Level 2 protection includes a fragile variable fluorescing invisible copy evident watermark with tracing information. The copy evidence may include the text of the page offset by some distance, but in any event depends on the contents of the page. The copy evidence and the tracing information may be encoded in the fragile variable fluorescing invisible copy evident watermark. As shown inFig. 5 , the document, including the contents, the copy evidence and tracing information, is printed by the trustedprinter 133 on standard paper using a special toner or ink. The special toner or ink is invisible fluorescing toner or ink. As shown in Table 1, the trustedprinter 133 can be a standard highlight or color printer that is supplied with the fluorescing invisible toner or ink. A sensor on the output of the printer could verify that the copy-evident mark is properly printed. - The variable nature of the copy-evident mark prevents a blank originals attack where the adversary pre-processes the paper by putting the special marks on it. The identifying information also allows for tracing the source of the unauthorized copy action. That is, the underlying information identifies who had custody over the original and should have been protecting it. The
Level 2 protection might also be used to give some protection against an adversary who tries to tamper with the contents of the document, because the two printings on the page would be visually different under fluorescent light. - As shown in Table 1 and in
Fig. 5 ,Level 2 provides protection against an adversary who has access to the original document and a standard photocopier with standard toner or ink. A document can be verified as an original by illuminating that document with fluorescence-exciting light. If the document contains a watermark that fluoresces under the fluorescence-exciting light and that matches the visible contents of the page, the document can be verified as an original. If the document does not have a watermark, if the document contains a watermark that does not fluoresce under fluorescence-exciting light, or if the document contains a watermark that fluoresces but does not match the visible contents of the page, the document can be established as a copy. - As shown in
Fig. 1 , the trustedprinter 133 can printdocuments having Level 3 protection. As shown in Table 1,Level 3 protection includes a fragile variable fluorescing invisible copy evident watermark with tracing information. The mark includes a copy or a portion of the text of the page offset to the right by some distance and printed using invisible fluorescing toner. Tracing information such as printer, user, timestamp, document-id, and page number is also printed using the invisible ink. The information contained in the copy evident mark is digitally signed and encoded into a glyph code that is printed in the left margin of the page. - As shown in Table 1 and
Fig. 6 ,Level 3 provides protection against an adversary who can scan, image process, and print, and thus attempt to tamper with the content of the document, and who has access to the special ink used. Protection against a naive attacker is via a fluorescent detector as inLevel 2 protection. Additional tamper protection and authenticity is provided by the digital signature encoded in the glyph code. - Special inks and an ordinary highlight printer or an ordinary color printer can be used to print the original documents. Enhancements to the printer can include sensors to check that fluorescent toner is loaded and used. Additionally, a sensor on the output of the printer can be used to verify that the copy evident mark is properly printed. A fluorescence-exciting light source can be used to expose the copy evident mark and a fluorescent light scanner can be used to read the information printed in fluorescent ink. This method is backward compatible with
Level 2 protection. - As shown in
Fig. 6 , a document may be verified as an original by the presence of a fluorescent copy-evident mark that matches the visible contents of the page or by successful verification of the digital signature encoded in the glyph code. A document may be verified as a copy by the absence of the fluorescent copy evident mark. If the fluorescent copy evident mark exists, the document may still be verified as a copy if the digital signature cannot be successfully verified. - As shown in
Fig. 1 , the trustedprinters documents having Level 4 protection. As shown in Table 1,Level 4 protection includes a fragile invisible fluorescing variable copy evident watermark to print randomly generated patterns. Tracing information is also included in the copy evident watermark. The random pattern of the copy evident mark is digitally signed and encoded into a glyph code that is printed on the page. - As shown in
Fig. 7 ,Level 4 provides protection against an adversary who has access to a scanner, image processing software, and a color printer, as well as access to the special ink used, and who may attempt to use these to tamper with the content of the document or to forge an acceptable copy evident mark. Additional tamper protection and authenticity is provided by the digital signature encoded in the glyph code. - Special inks and an ordinary highlight printer or ordinary color printer can be used to print the original documents. Enhancements to the printer could include sensors to check that fluorescent toner is loaded and used. Additionally, a sensor on the output of the printer can be used to verify that the pattern is properly printed. A fluorescent light source can be used to expose the copy evident mark. A fluorescence-exciting light scanner can be used to read the information printed in the fluorescent ink.
- As shown in
Fig. 7 , a document may be verified as an original if the fluorescent pattern measured from the paper matches the pattern encoded in the glyph code or by successful verification of the digital signature. A document may be verified as a copy by the absence of the fluorescent copy evident watermark. If the copy evident mark is present, the document may still be verified as a copy if the fluorescent pattern measured from the paper fails to match the pattern encoded in the glyph code. A document may also be verified as a copy if the digital signature cannot be successfully verified. - As shown in
Fig. 1 , the trustedprinter 134 can printdocuments having Level 5 protection. As shown in Table 1, copy evidence is provided by the use of a robust fluorescing black copy evident mark. Tracing information is encoded in the mark. As shown inFig. 8 ,Level 5 provides protection against an adversary who uses a standard copier to make an unauthorized copy or attempted forgery, and who does not have access to the fluorescing ink. The equipment that can be used to enableLevel 5 protection is fluorescing black toner in an ordinary highlight or color printer. A fluorescence-exciting light source can aid in the verification of the copy evident watermark. - A document may be verified as an original by visually inspecting the document. Visual inspection reveals the fluorescing black copy evident mark. A document may be verified as a copy by the absence of the copy evident mark, or a copy evident mark printed in ordinary ink.
- As shown in
Fig. 1 , the trustedprinter 134 can printdocuments having Level 6 protection. As shown in Table 1, copy evidence is provided by the use of a robust fluorescing black copy evident mark. For example, such as mark could be created by printing fluorescing invisible ink over ordinary black ink. The fluorescent black ink is used to print fixed portions of the document contents (the portion selected to be printed in this way does not depend on the document contents). Tracing information can also be encoded in the mark. As shown inFig. 9 ,Level 6 provides protection against an adversary who uses a plain copier to make an unauthorized copy or attempted forgery and who does not have access to the special ink.Level 6 also protects against an adversary with physical access to the trusted printer that detaches the fluorescing toner, since this would cause portions of the printed page to disappear. - The equipment that can be used to provide
Level 6 protection includes fluorescing black toner or ink in an ordinary highlight or color printer or a combination of fluorescing invisible ink and ordinary black ink. A special viewer can be used to detect and verify the correct pattern of the copy evident watermark. - As shown in
Fig. 9 , a document may be verified as an original by visually inspecting the document to verify that the entire contents of the document page have been printed. A special viewer may be used to verify that part of the visible contents of the document fluoresces or to verify the correct fluorescent pattern. A document may be verified as a copy by visually inspecting the document. If a portion of the page has not been printed, the document can be verified as a copy. If the entire page has been printed, the document may be verified as a copy by the absence of the fluorescing black copy evident mark, or by the existence of a non-fluorescing copy evident mark. A document may be verified as a copy if the special viewer reveals an incorrect fluorescing pattern in the copy evident mark. - As shown in
Fig. 1 , the trustedprinters documents having Level 7 protection. As shown in Table 1,Level 7 protection includes a robust fluorescent black variable copy evident watermark. As shown inFig. 10 , the fluorescent black toner or ink is used to print randomly selected portions of the content of the document. The information about which pattern is used is encrypted and encoded as a glyph code that is printed on the document using a key that is known to the trustedprinters - As shown in
Fig. 10 ,Level 7 provides protection against an adversary that has access to an original document and the trustedprinter Level 7 also protects against an attacker with physical access to the trusted printer that detaches the fluorescing toner, since this would cause portions of the printed page to disappear.Level 7 also protects against an attacker who has a scanner and an image processor. - Verification of a document as an original can be done using fluorescence-exciting light. If portions of the document fluoresces when exposed to fluorescence-exciting light, this is evidence that the document may be an original. A second tier inspection is necessary. The inspector device verifies that the decrypted glyph-encoded information matches the fluorescent pattern. If portions of the document are missing, the document can be verified as a copy. If the entire document is printed but has no watermark or a black watermark that does not fluoresce, the document can be established as a copy. If the document has fluorescent portions but the decrypted glyph encoded information does not match the fluorescent pattern, the document can be established as a copy. If the decoded, decrypted pattern information matches the detected pattern, the document can be verified as an original.
- The trusted
printers - As shown in
Fig. 1 , the trustedprinters documents having Level 8 protection. As shown in Table 1,Level 8 protection includes a robust fluorescing black variable copy evident watermark to print content dependent portions of the document, with tracing information that is encrypted given a key known to the printer and to the inspector device and glyph encoded. The watermark includes selected portions of the document's contents that are printed in fluorescing black toner or ink. The selected portions are selected as a function of the document's content. Information about the user and about the trustedprinter - As shown in Table 1,
Level 8 provides protection against an adversary that has access to the original document and a standard copier and standard toner or ink. As shown inFig. 11 ,Level 8 also protects against an adversary that has access to the original document, a scanner, an image processor and the trustedprinter Level 8 also protects against a detached toner attack, since this would cause portions of the printed page to disappear. - Establishing a document as a copy can also be done by a visual inspection. If portions of the printed document are missing, the document can be established as a copy. If the entire document is printed but has no visible watermark or a visible watermark that does not fluoresce; the document can be established as a copy. A second tier inspection determines if the pattern information that is decoded and decrypted from the glyph code by the inspector device matches the fluorescent pattern detected by a fluorescent light scanner. If the decoded, decrypted pattern information matches the detected pattern, the document can be verified as an original.
- The trusted
printers
Claims (10)
- A document forgery protection printing method comprising:processing (S1100) an image of a document;determining (S1500) forgery protection requirements for.the document to be printed;determining (S1600) a protection level to be applied to the document based on the determined forgery protection requirements; andbased on the determined protection level, printing (S2000) at least one watermark on the document that corresponds to the determined protection level using a printer, characterised in that the forgery protection requirements for the document to be printed are determined from a set of different potential requirements;in that the protection level is determined (S1600) from a set of different protection levels based on the determined forgery protection requirements; andin that the method further comprises selecting a printer from a plurality of printers that can print the document in accordance with the required level of protection and using the selected printer to print the at least one watermark.
- A method according to claim 1, wherein the watermark comprises random generated patterns printed using invisible fluorescing toner or ink.
- A method according to claim 1 or claim 2, wherein the watermark is printed using fluorescing black toner or ink.
- A method according to claim 3, wherein the watermark comprises fixed portions or random portions of each page or content dependent portions of each page printed using the fluorescing black toner or ink.
- A method according to claim 2 or claim 4, wherein the randomly generated patterns or random portions of each page are encoded in a glyph and preferably digitally signed.
- A document forgery protection printing system, comprising:at least one image processor that processes an image of a document including at least one page;at least one server (110) having a print management system (112) adapted to implement a policy (113) that determines a forgery protection level for the document in accordance with forgery protection requirements for the document;a plurality of printers (131-135), each printer adapted to print the document and to apply at least one protection level to the document by printing at least one watermark including copy evidence and tracing information on the document that corresponds to the determined protection level, characterised in that said policy is adapted to determine the forgery protection requirements for the document from a set of different potential requirements;in that the protection level is determined from a set of different protection levels based on the determined forgery protection requirements; andin that said print management system (112) is adapted to select a printer from the plurality of printers (131-135) to print the at least one watermark in accordance with the required level of protection.
- A system according to claim 6, wherein the copy evidence and/or the tracing information is encoded in the watermark.
- A system according to claim 6 or claim 7, wherein the copy evidence varies with each page of the document.
- A system according to any one of claim 6 to 8, wherein the watermark comprises the contents of each page printed using invisible fluorescing toner or ink and offset from the visible contents of each page.
- A system according to any one of claims 6 to 9, wherein the tracing information is digitally signed and encoded in a glyph and printed using invisible fluorescing toner or ink and located in a margin of each page.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/722,362 US6970259B1 (en) | 2000-11-28 | 2000-11-28 | Systems and methods for forgery detection and deterrence of printed documents |
US09/722,508 US7110541B1 (en) | 2000-11-28 | 2000-11-28 | Systems and methods for policy based printing |
US722508 | 2000-11-28 | ||
US722362 | 2000-11-28 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1209897A2 EP1209897A2 (en) | 2002-05-29 |
EP1209897A3 EP1209897A3 (en) | 2003-10-15 |
EP1209897B1 true EP1209897B1 (en) | 2008-07-23 |
Family
ID=27110583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20010309647 Expired - Lifetime EP1209897B1 (en) | 2000-11-28 | 2001-11-15 | Systems and method for policy based printing and forgery detection |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1209897B1 (en) |
JP (1) | JP4688375B2 (en) |
DE (1) | DE60134940D1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7738673B2 (en) | 2000-04-19 | 2010-06-15 | Digimarc Corporation | Low visible digital watermarks |
US7762468B2 (en) | 2001-08-31 | 2010-07-27 | Digimarc Corporation | Readers to analyze security features on objects |
US7986806B2 (en) | 1994-11-16 | 2011-07-26 | Digimarc Corporation | Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network |
US7991184B2 (en) | 1995-05-08 | 2011-08-02 | Digimarc Corporation | Apparatus to process images and video |
US8006092B2 (en) | 2001-01-24 | 2011-08-23 | Digimarc Corporation | Digital watermarks for checking authenticity of printed objects |
US8027509B2 (en) | 2000-04-19 | 2011-09-27 | Digimarc Corporation | Digital watermarking in data representing color channels |
US8094869B2 (en) | 2001-07-02 | 2012-01-10 | Digimarc Corporation | Fragile and emerging digital watermarks |
US8190901B2 (en) | 2002-05-29 | 2012-05-29 | Digimarc Corporation | Layered security in digital watermarking |
US8199969B2 (en) | 2008-12-17 | 2012-06-12 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US9117268B2 (en) | 2008-12-17 | 2015-08-25 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US11584140B2 (en) | 2020-07-31 | 2023-02-21 | Kyocera Document Solutions Inc. | Concealable marking |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US6721440B2 (en) | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US6763123B2 (en) | 1995-05-08 | 2004-07-13 | Digimarc Corporation | Detection of out-of-phase low visibility watermarks |
US6718046B2 (en) | 1995-05-08 | 2004-04-06 | Digimarc Corporation | Low visibility watermark using time decay fluorescence |
US6804377B2 (en) | 2000-04-19 | 2004-10-12 | Digimarc Corporation | Detecting information hidden out-of-phase in color channels |
US6763124B2 (en) | 2000-04-19 | 2004-07-13 | Digimarc Corporation | Embedding digital watermarks in spot colors |
US6993149B2 (en) | 2001-09-25 | 2006-01-31 | Digimarc Corporation | Embedding digital watermarks in spot colors |
US6760464B2 (en) | 2000-10-11 | 2004-07-06 | Digimarc Corporation | Halftone watermarking and related applications |
US6512837B1 (en) | 2000-10-11 | 2003-01-28 | Digimarc Corporation | Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration |
US7072487B2 (en) | 2001-01-26 | 2006-07-04 | Digimarc Corporation | Watermark detection using adaptive color projections |
WO2003052680A1 (en) | 2001-12-18 | 2003-06-26 | Digimarc Id System, Llc | Multiple image security features for identification documents and methods of making same |
US7054461B2 (en) | 2002-02-15 | 2006-05-30 | Pitney Bowes Inc. | Authenticating printed objects using digital watermarks associated with multidimensional quality metrics |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
EP1383327B1 (en) * | 2002-06-11 | 2013-12-25 | Panasonic Corporation | Content distributing system and data-communication controlling device |
JP2004164604A (en) * | 2002-10-11 | 2004-06-10 | Ricoh Co Ltd | Electronic file management device, program, and file access control method |
JP4527374B2 (en) * | 2002-09-19 | 2010-08-18 | 株式会社リコー | Image forming apparatus and document attribute management server |
US7197644B2 (en) * | 2002-12-16 | 2007-03-27 | Xerox Corporation | Systems and methods for providing hardcopy secure documents and for validation of such documents |
JP4485293B2 (en) * | 2003-09-08 | 2010-06-16 | 株式会社リコー | Information processing apparatus, client terminal, image forming apparatus, data processing method, and program for causing computer to execute the method |
JP4704010B2 (en) * | 2003-11-14 | 2011-06-15 | 株式会社リコー | Image forming apparatus, image forming system, security management apparatus, and security management method |
US7770022B2 (en) | 2004-02-06 | 2010-08-03 | Sharp Laboratories Of America, Inc. | Systems and methods for securing an imaging job |
JP4517389B2 (en) * | 2004-12-13 | 2010-08-04 | 富士ゼロックス株式会社 | Output management apparatus, output management method and program thereof |
JP2006260136A (en) * | 2005-03-17 | 2006-09-28 | Ricoh Co Ltd | Printer controller and print control method |
CN100391745C (en) * | 2005-06-13 | 2008-06-04 | 北京北大方正电子有限公司 | Printing method of security file inlaid with anti-copying back-lines |
JP4529828B2 (en) * | 2005-07-19 | 2010-08-25 | 富士ゼロックス株式会社 | Document falsification prevention device |
WO2007049337A1 (en) * | 2005-10-25 | 2007-05-03 | Fujitsu Limited | Printed image producing program, recording medium thereof, and printed image producing method |
CN100558139C (en) * | 2005-12-15 | 2009-11-04 | 佳能株式会社 | Image processing apparatus and image processing method |
JP5001026B2 (en) * | 2006-03-24 | 2012-08-15 | 株式会社沖データ | Image forming apparatus and image forming system |
JP4928998B2 (en) | 2007-03-16 | 2012-05-09 | 株式会社リコー | Image forming apparatus and image forming method |
JP5178132B2 (en) * | 2007-10-11 | 2013-04-10 | キヤノン株式会社 | Image processing system and image processing method |
US8257897B2 (en) * | 2008-09-19 | 2012-09-04 | Xerox Corporation | Toners with fluorescence agent and toner sets including the toners |
WO2010034653A1 (en) * | 2008-09-25 | 2010-04-01 | Oce-Technologies B.V. | Method of restricted printing of documents |
JP4538823B2 (en) * | 2009-03-24 | 2010-09-08 | セイコーエプソン株式会社 | Image processing system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5564109A (en) * | 1991-09-13 | 1996-10-08 | Eastman Kodak Company | Remote user interface for prioritizing and selecting from a plurality of document production peripheral devices |
US5949885A (en) * | 1996-03-12 | 1999-09-07 | Leighton; F. Thomson | Method for protecting content using watermarking |
CA2227381C (en) * | 1997-02-14 | 2001-05-29 | Nec Corporation | Image data encoding system and image inputting apparatus |
US6141753A (en) * | 1998-02-10 | 2000-10-31 | Fraunhofer Gesellschaft | Secure distribution of digital representations |
JP3156667B2 (en) * | 1998-06-01 | 2001-04-16 | 日本電気株式会社 | Digital watermark insertion system, digital watermark characteristic table creation device |
JP2000295454A (en) * | 1999-04-05 | 2000-10-20 | Hitachi Ltd | Unit and method for electronic watermark and recording medium |
JP3607915B2 (en) * | 1999-04-27 | 2005-01-05 | コニカミノルタビジネステクノロジーズ株式会社 | Image processing device |
US6807634B1 (en) * | 1999-11-30 | 2004-10-19 | International Business Machines Corporation | Watermarks for customer identification |
EP1137252A3 (en) * | 2000-02-16 | 2002-05-08 | Eastman Kodak Company | Embedding two sets of information in a digital image |
-
2001
- 2001-09-21 JP JP2001290056A patent/JP4688375B2/en not_active Expired - Fee Related
- 2001-11-15 EP EP20010309647 patent/EP1209897B1/en not_active Expired - Lifetime
- 2001-11-15 DE DE60134940T patent/DE60134940D1/en not_active Expired - Lifetime
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7986806B2 (en) | 1994-11-16 | 2011-07-26 | Digimarc Corporation | Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network |
US7991184B2 (en) | 1995-05-08 | 2011-08-02 | Digimarc Corporation | Apparatus to process images and video |
US9179033B2 (en) | 2000-04-19 | 2015-11-03 | Digimarc Corporation | Digital watermarking in data representing color channels |
US8027509B2 (en) | 2000-04-19 | 2011-09-27 | Digimarc Corporation | Digital watermarking in data representing color channels |
US7738673B2 (en) | 2000-04-19 | 2010-06-15 | Digimarc Corporation | Low visible digital watermarks |
US8006092B2 (en) | 2001-01-24 | 2011-08-23 | Digimarc Corporation | Digital watermarks for checking authenticity of printed objects |
US8094869B2 (en) | 2001-07-02 | 2012-01-10 | Digimarc Corporation | Fragile and emerging digital watermarks |
US7762468B2 (en) | 2001-08-31 | 2010-07-27 | Digimarc Corporation | Readers to analyze security features on objects |
US8123134B2 (en) | 2001-08-31 | 2012-02-28 | Digimarc Corporation | Apparatus to analyze security features on objects |
US8190901B2 (en) | 2002-05-29 | 2012-05-29 | Digimarc Corporation | Layered security in digital watermarking |
US8345316B2 (en) | 2002-05-29 | 2013-01-01 | Digimarc Corporation | Layered security in digital watermarking |
US8660298B2 (en) | 2008-12-17 | 2014-02-25 | Digimarc Corporation | Encoding in two chrominance directions |
US9117268B2 (en) | 2008-12-17 | 2015-08-25 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US8199969B2 (en) | 2008-12-17 | 2012-06-12 | Digimarc Corporation | Out of phase digital watermarking in two chrominance directions |
US9245308B2 (en) | 2008-12-17 | 2016-01-26 | Digimarc Corporation | Encoding in two chrominance directions |
US9582844B2 (en) | 2008-12-17 | 2017-02-28 | Digimarc Corporation | Detection from two chrominance directions |
US11584140B2 (en) | 2020-07-31 | 2023-02-21 | Kyocera Document Solutions Inc. | Concealable marking |
Also Published As
Publication number | Publication date |
---|---|
JP4688375B2 (en) | 2011-05-25 |
EP1209897A3 (en) | 2003-10-15 |
JP2002190947A (en) | 2002-07-05 |
EP1209897A2 (en) | 2002-05-29 |
DE60134940D1 (en) | 2008-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1209897B1 (en) | Systems and method for policy based printing and forgery detection | |
US6970259B1 (en) | Systems and methods for forgery detection and deterrence of printed documents | |
US7110541B1 (en) | Systems and methods for policy based printing | |
US6983056B1 (en) | Method and device for embedding and detecting watermarking information into a black and white binary document image | |
US8280101B2 (en) | Identification documents and authentication of such documents | |
US7580159B2 (en) | Method, program, and apparatus for preventing a reproduction of an anti-copy document, and a medium storing the program | |
US8040541B2 (en) | Secure document printing | |
US6973196B2 (en) | Authentic document and method of making | |
EP0988151B1 (en) | Security document containing encoded data block | |
US6351815B1 (en) | Media-independent document security method and apparatus | |
US20070003341A1 (en) | Image processing device, image processing method, program, and recording medium | |
JP2002236960A (en) | Method and device for authenticating document using physical characteristics of physical medium | |
JP2004201321A (en) | System and method for providing and validating hardcopy secure document | |
KR20000048145A (en) | Ticket issuing method, ticket issuing system and ticket collating method | |
EP2237546A1 (en) | Device and process for protecting a digital document, and corresponding process for verifying the authenticity of a printed hardcopy | |
US6993655B1 (en) | Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics | |
US6636614B1 (en) | Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph | |
JP2008028449A (en) | Confidential document processing apparatus | |
KR100771133B1 (en) | Forming apparatus for image and restricting method of copy thereof | |
JP2000253241A (en) | Data monitoring method and device therefor | |
KR102114391B1 (en) | System and method for printing security of computerised documentation | |
KR101287811B1 (en) | Hierarchical miniature security marks | |
JP3775211B2 (en) | Image information processing method and image information processing apparatus | |
JP2001344557A (en) | Method and device for managing document | |
JP4021728B2 (en) | Certifiable documents and how to create them |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: R. DREWS, DEAN Inventor name: BELL, ALAN G. Inventor name: BREUEL, THOMAS M. Inventor name: STEFIK, MARK J. Inventor name: LUNT, TERESA F. Inventor name: HECHT, DAVID L. Inventor name: FRANKLIN, MATTHEW K. Inventor name: BERSON, THOMAS A. |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
17P | Request for examination filed |
Effective date: 20040415 |
|
AKX | Designation fees paid |
Designated state(s): DE FR GB |
|
17Q | First examination report despatched |
Effective date: 20061228 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60134940 Country of ref document: DE Date of ref document: 20080904 Kind code of ref document: P |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20090424 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 15 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20161020 Year of fee payment: 16 Ref country code: FR Payment date: 20161024 Year of fee payment: 16 Ref country code: GB Payment date: 20161027 Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60134940 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20171115 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20180731 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171130 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180602 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171115 |